{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T20:18:34Z","timestamp":1762028314779,"version":"build-2065373602"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,22]]},"DOI":"10.1109\/hpec43674.2020.9286256","type":"proceedings-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T21:07:15Z","timestamp":1608671235000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Fast Training of Deep Neural Networks Robust to Adversarial Perturbations"],"prefix":"10.1109","author":[{"given":"Justin","family":"Goodwin","sequence":"first","affiliation":[]},{"given":"Olivia","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Victoria","family":"Helus","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Robustness (python library)","year":"2019","author":"engstrom","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2018.8547629"},{"key":"ref32","first-page":"1260","article-title":"Image synthesis with a single (robust) classifier","author":"santurkar","year":"2019","journal-title":"Advances in neural information processing systems"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref35","article-title":"Pytorch lightning","volume":"3","author":"falcon","year":"2019","journal-title":"Github"},{"key":"ref34","first-page":"8024","article-title":"Pytorch: An imperative style, high-performance deep learning library","author":"paszke","year":"2019","journal-title":"Advances in Neural IInformation Processing Systems"},{"journal-title":"Secure and robust machine learning for healthcare A survey","year":"2020","author":"qayyum","key":"ref10"},{"journal-title":"Securing connected & autonomous vehicles Challenges posed by adversarial machine learning and the way forward","year":"2019","author":"qayyum","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2019.8916519"},{"journal-title":"Towards deep neural network architectures robust to adversarial examples","year":"2014","author":"gu","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.04.027"},{"key":"ref15","first-page":"854","article-title":"Parseval networks: Improving robustness to adversarial examples","volume":"70","author":"cisse","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"journal-title":"Defensive distillation is not robust to adversarial examples","year":"2016","author":"carlini","key":"ref17"},{"key":"ref18","first-page":"3","author":"carlini","year":"2017","journal-title":"Adversarial examples are not easily detected Bypassing ten detection methods"},{"key":"ref19","first-page":"39","author":"carlini","year":"2017","journal-title":"Towards Evaluating the Robustness of Neural Networks"},{"journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition","year":"2014","author":"simonyan","key":"ref4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2019.8916416"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"journal-title":"Accurate large minibatch sgd Training imagenet in 1 hour","year":"2017","author":"goyal","key":"ref27"},{"key":"ref6","first-page":"387","article-title":"Evasion attacks against machine learning at test time","author":"biggio","year":"2013","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"},{"journal-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref8"},{"journal-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref1","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref9","article-title":"Explainable artificial intelligence (xai)","volume":"2","author":"gunning","year":"2017","journal-title":"Defense Advanced Research Projects Agency (DARPA)"},{"journal-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"madry","key":"ref20"},{"key":"ref22","first-page":"125","article-title":"Adversarial examples are not bugs, they are features","author":"ilyas","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref21","volume":"2","author":"sinha","year":"2017","journal-title":"Certifiable Distributional Robustness with Principled Adversarial Training"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00019"},{"journal-title":"Learning perceptually-aligned representations via adversarial robustness","year":"2019","author":"engstrom","key":"ref23"},{"journal-title":"Fast is better than free Revisiting adversarial training","year":"2020","author":"wong","key":"ref26"},{"key":"ref25","first-page":"3353","article-title":"Adversarial training for free!","author":"shafahi","year":"2019","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2020 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2020,9,22]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2020,9,24]]}},"container-title":["2020 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9285977\/9286137\/09286256.pdf?arnumber=9286256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:54:48Z","timestamp":1656345288000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9286256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/hpec43674.2020.9286256","relation":{},"subject":[],"published":{"date-parts":[[2020,9,22]]}}}